Sciweavers

2084 search results - page 299 / 417
» Knowledge Exploitation from the Web
Sort
View
ML
2010
ACM
175views Machine Learning» more  ML 2010»
13 years 5 months ago
Concept learning in description logics using refinement operators
With the advent of the Semantic Web, description logics have become one of the most prominent paradigms for knowledge representation and reasoning. Progress in research and applica...
Jens Lehmann, Pascal Hitzler
WISEC
2009
ACM
14 years 5 months ago
Mitigating control-channel jamming attacks in multi-channel ad hoc networks
We address the problem of control-channel jamming attacks in multi-channel ad hoc networks. Deviating from the traditional view that sees jamming attacks as a physical-layer vulne...
Loukas Lazos, Sisi Liu, Marwan Krunz
CVPR
2008
IEEE
14 years 4 months ago
3D shape reconstruction of Mooney faces
Two-tone (“Mooney”) images seem to arouse vivid 3D percept of faces, both familiar and unfamiliar, despite their seemingly poor content. Recent psychological and fMRI studies ...
Ira Kemelmacher-Shlizerman, Ronen Basri, Boaz Nadl...
USS
2008
14 years 22 days ago
To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads
We present an automated, scalable, method for crafting dynamic responses to real-time network requests. Specifically, we provide a flexible technique based on natural language pro...
Sam Small, Joshua Mason, Fabian Monrose, Niels Pro...
JAIR
2010
143views more  JAIR 2010»
13 years 8 months ago
A Utility-Theoretic Approach to Privacy in Online Services
Online offerings such as web search, news portals, and e-commerce applications face the challenge of providing high-quality service to a large, heterogeneous user base. Recent eff...
Andreas Krause, Eric Horvitz